Sciweavers

1486 search results - page 42 / 298
» Firewall Rules Analysis
Sort
View
KDD
2003
ACM
190views Data Mining» more  KDD 2003»
16 years 4 months ago
Distance-enhanced association rules for gene expression
We introduce a novel data mining technique for the analysis of gene expression. Gene expression is the effective production of the protein that a gene encodes. We focus on the cha...
Aleksandar Icev, Carolina Ruiz, Elizabeth F. Ryder
144
Voted
DEDUCTIVE
1994
122views Database» more  DEDUCTIVE 1994»
15 years 5 months ago
A Simple Model for Active Rules and their Behavior in Deductive Databases
Recent advances in non-monotonic semantics of deductive databases provide a simple framework for modeling the even-condition-action rules of active databases. This approach unifie...
Carlo Zaniolo, Reza Sadri
COLING
2008
15 years 5 months ago
ILP-based Conceptual Analysis for Chinese NPs
In this paper, we explore a conceptual resource for Chinese nominal phrases, which allows multi-dependency and distinction between dependency and the corresponding exact relation....
Paul D. Ji, Stephen G. Pulman
147
Voted
SAS
2009
Springer
171views Formal Methods» more  SAS 2009»
16 years 4 months ago
Bottom-Up Shape Analysis
In this paper we present a new shape analysis algorithm. The key distinguishing aspect of our algorithm is that it is completely compositional, bottom-up and non-iterative. We pres...
Bhargav S. Gulavani, Supratik Chakraborty, Ganesan...
ICSE
2008
IEEE-ACM
16 years 3 months ago
Formal concept analysis applied to fault localization
One time-consuming task in the development of software is debugging. Recent work in fault localization crosschecks traces of correct and failing execution traces, it implicitly se...
Peggy Cellier